Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T103746063F1C4607B160AFDC8C332F7A9E09704B8CBB6A857F2E1078D97A6D52C55349A |
|
CONTENT
ssdeep
|
1536:xupxupCEupK6uprwJsYWtC7glG71sV+XO+f0VzGLADx196L8Xq+7IXLxC302fNKb:qDMI1Co |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed33682d63642b3c |
|
VISUAL
aHash
|
c3c3c3c3c3c3c3c3 |
|
VISUAL
dHash
|
0b3b130323332723 |
|
VISUAL
wHash
|
c3c3c3c3c3c3c3c3 |
|
VISUAL
colorHash
|
07200010040 |
|
VISUAL
cropResistant
|
0b3b130323332723,0040080808800000,c9a3a1a5565082a6,b28bec88b36be3e3,b33333d4c433c460,d493919414303415,13305e060f26339b |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.